{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:36:53Z","timestamp":1753274213986,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,8]],"date-time":"2009-07-08T00:00:00Z","timestamp":1247011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,8]]},"DOI":"10.1145\/1569901.1570127","type":"proceedings-article","created":{"date-parts":[[2009,7,21]],"date-time":"2009-07-21T13:32:17Z","timestamp":1248183137000},"page":"1689-1696","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Search-based failure discovery using testability transformations to generate pseudo-oracles"],"prefix":"10.1145","author":[{"given":"Phil","family":"McMinn","sequence":"first","affiliation":[{"name":"University of Sheffield, Sheffield, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2009,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_3_2_1_2_1","first-page":"149","volume-title":"First International Computer Software and Application Conference (COMPSAC '77)","author":"Avizienis A.","year":"1977","unstructured":"A. Avizienis and L. Chen . On the implementation of N-version programming for software fault-tolerance during execution . First International Computer Software and Application Conference (COMPSAC '77) , pages 149 -- 155 , 1977 . A. Avizienis and L. Chen. On the implementation of N-version programming for software fault-tolerance during execution. First International Computer Software and Application Conference (COMPSAC '77), pages 149--155, 1977."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v15:2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068183"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Computer, Communication and Control Technologies and The 9th International Conference on Information Systems Analysis and Synthesis","author":"Buehler O.","year":"2003","unstructured":"O. Buehler and J. Wegener . Evolutionary functional testing of an automated parking system . International Conference on Computer, Communication and Control Technologies and The 9th International Conference on Information Systems Analysis and Synthesis , Orlando, Florida, USA , 2003 . O. Buehler and J. Wegener. Evolutionary functional testing of an automated parking system. International Conference on Computer, Communication and Control Technologies and The 9th International Conference on Information Systems Analysis and Synthesis, Orlando, Florida, USA, 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"Search-based metamorphic testing. Technical report","author":"Clark J.","year":"2003","unstructured":"J. Clark and R. Hierons . Search-based metamorphic testing. Technical report , University of York , unpublished, 2003 . J. Clark and R. Hierons. Search-based metamorphic testing. Technical report, University of York, unpublished, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776822"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287651"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/800175.809889"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxl003"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/251880.251992"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/103162.103163"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2008.30"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/978-3-540-78917-8_11","volume-title":"Testability transformation -- program transformation to improve testability. Formal Methods and Testing","author":"Harman M.","year":"2008","unstructured":"M. Harman , A. Baresel , D. Binkley , R. Hierons , L. Hu , B. Korel , P. McMinn , and M. Roper . Testability transformation -- program transformation to improve testability. Formal Methods and Testing , Lecture Notes in Computer Science , volume 4949 , pages 320 -- 344 . Springer-Verlag , 2008 . M. Harman, A. Baresel, D. Binkley, R. Hierons, L. Hu, B. Korel, P. McMinn, and M. Roper. Testability transformation -- program transformation to improve testability. Formal Methods and Testing, Lecture Notes in Computer Science, volume 4949, pages 320--344. Springer-Verlag, 2008."},{"key":"e_1_3_2_1_16_1","first-page":"1359","volume-title":"Genetic and Evolutionary Computation Conference (GECCO 2002","author":"Harman M.","year":"2002","unstructured":"M. Harman , L. Hu , R. Hierons , A. Baresel , and H. Sthamer . Improving evolutionary testing by flag removal . Genetic and Evolutionary Computation Conference (GECCO 2002 ), pages 1359 -- 1366 , New York, USA , 2002 . Morgan Kaufmann. M. Harman, L. Hu, R. Hierons, A. Baresel, and H. Sthamer. Improving evolutionary testing by flag removal. Genetic and Evolutionary Computation Conference (GECCO 2002), pages 1359--1366, New York, USA, 2002. Morgan Kaufmann."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265732"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273475"},{"key":"e_1_3_2_1_19_1","unstructured":"Bug ID: 4466549 Add saturation\/overflow integer arithmetic. http:\/\/bugs.sun.com\/bugdatabase\/view bug.do?bug id=4466549.  Bug ID: 4466549 Add saturation\/overflow integer arithmetic. http:\/\/bugs.sun.com\/bugdatabase\/view bug.do?bug id=4466549."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.36"},{"key":"e_1_3_2_1_21_1","unstructured":"M.E. Kabay. Salami fraud. Network World Security Newsletter http:\/\/www.networkworld.com\/newsletters\/sec\/2002\/01467137.html 2002.  M.E. Kabay. Salami fraud. Network World Security Newsletter http:\/\/www.networkworld.com\/newsletters\/sec\/2002\/01467137.html 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.57624"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.16"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988709"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v14:2"},{"key":"e_1_3_2_1_27_1","volume-title":"Fast Abstract","author":"McMinn P.","year":"2007","unstructured":"P. McMinn . Co-testability transformation. Testing: Academic&amp;Industrial Conference -- Practice And Research Techniques (TAIC PART 2008) , Fast Abstract , 2007 . P. McMinn. Co-testability transformation. Testing: Academic&amp;Industrial Conference -- Practice And Research Techniques (TAIC PART 2008), Fast Abstract, 2007."},{"key":"e_1_3_2_1_28_1","first-page":"165","volume-title":"UK Software Testing Workshop (UKTest 2005","author":"McMinn P.","year":"2005","unstructured":"P. McMinn , D. Binkley , and M. Harman . Testability transformation for efficient automated test data search in the presence of nesting . UK Software Testing Workshop (UKTest 2005 ), pages 165 -- 182 . University of Shefield Computer Science Technical Report CS-05-07 , 2005 . P. McMinn, D. Binkley, and M. Harman. Testability transformation for efficient automated test data search in the presence of nesting. UK Software Testing Workshop (UKTest 2005), pages 165--182. University of Shefield Computer Science Technical Report CS-05-07, 2005."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525880.1525884"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146241"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233818"},{"key":"e_1_3_2_1_32_1","volume-title":"Java Threads. O'Reilly","author":"Oaks S.","year":"1999","unstructured":"S. Oaks and H. Wong . Java Threads. O'Reilly , 2 nd edition, 1999 . S. Oaks and H. Wong. Java Threads. O'Reilly, 2nd edition, 1999.","edition":"2"},{"key":"e_1_3_2_1_33_1","first-page":"824","volume-title":"International Test Conference","author":"O\u00fdutt A.J.","year":"1994","unstructured":"A.J. O\u00fdutt . A practical system for mutation testing: Help for the common programmer . International Test Conference , pages 824 -- 830 , 1994 . A.J. O\u00fdutt. A practical system for mutation testing: Help for the common programmer. International Test Conference, pages 824--830, 1994."},{"key":"e_1_3_2_1_34_1","first-page":"137","article-title":"Automatically detecting equivalent mutants and infeasible paths. Software Testing","volume":"7","author":"O\u00fdutt J","year":"1997","unstructured":"A. J O\u00fdutt and J. Pan . Automatically detecting equivalent mutants and infeasible paths. Software Testing , Verification and Reliability , 7 : 137 -- 194 , 1997 . A.J O\u00fdutt and J. Pan. Automatically detecting equivalent mutants and infeasible paths. Software Testing, Verification and Reliability, 7:137--194, 1997.","journal-title":"Verification and Reliability"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<263::AID-STVR190>3.0.CO;2-Y"},{"key":"e_1_3_2_1_36_1","volume-title":"Introduction to Programming in Java: An Interdisciplinary Approach","author":"Sedgewick R.","year":"2007","unstructured":"R. Sedgewick and K. Wayne . Introduction to Programming in Java: An Interdisciplinary Approach . Addison Wesley , 1 st edition, 2007 . R. Sedgewick and K. Wayne. Introduction to Programming in Java: An Interdisciplinary Approach. Addison Wesley, 1st edition, 2007.","edition":"1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007528"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200001)30:1%3C61::AID-SPE292%3E3.0.CO;2-9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146240"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00190-2"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011132221066"},{"key":"e_1_3_2_1_42_1","first-page":"25","article-title":"On testing non-testable programs","author":"Weyuker E.","year":"1982","unstructured":"E. Weyuker . On testing non-testable programs . The Computer Journal , 25 , 1982 . E. Weyuker. On testing non-testable programs. The Computer Journal, 25, 1982.","journal-title":"The Computer Journal"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273483"},{"key":"e_1_3_2_1_44_1","volume-title":"8th International Symposium on Future Software Technology (ISFST 2004)","author":"Zhou Z.","year":"2004","unstructured":"Z. Zhou , D. Huang , T. Tse , Z. Yang , H. Huang , and T. Chen . Metamorphic testing and its applications . 8th International Symposium on Future Software Technology (ISFST 2004) , 2004 . Z. Zhou, D. Huang, T. Tse, Z. Yang, H. Huang, and T. Chen. Metamorphic testing and its applications. 8th International Symposium on Future Software Technology (ISFST 2004), 2004."},{"key":"e_1_3_2_1_45_1","unstructured":"J. Zukowski. The need for BigDecimal. Core Java Technologies Tech Tips http:\/\/blogs.sun.com\/CoreJavaTechTips\/entry\/the need for bigdecimal 2007.  J. Zukowski. The need for BigDecimal. Core Java Technologies Tech Tips http:\/\/blogs.sun.com\/CoreJavaTechTips\/entry\/the need for bigdecimal 2007."}],"event":{"name":"GECCO09: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Montreal Qu\u00e9bec Canada","acronym":"GECCO09"},"container-title":["Proceedings of the 11th Annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1569901.1570127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1569901.1570127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:58Z","timestamp":1750249078000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1569901.1570127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,8]]},"references-count":44,"alternative-id":["10.1145\/1569901.1570127","10.1145\/1569901"],"URL":"https:\/\/doi.org\/10.1145\/1569901.1570127","relation":{},"subject":[],"published":{"date-parts":[[2009,7,8]]},"assertion":[{"value":"2009-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}